110
2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 - - 1 - Name: Graham Speake Position: Vice President and Chief Product Architect Company: NexDefense Security Standards Overview Harness the Future of Innovation

Security Standards Overview

  • Upload
    dokiet

  • View
    232

  • Download
    2

Embed Size (px)

Citation preview

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 1 - - 1 -

Name: Graham Speake

Position: Vice President and Chief Product Architect

Company: NexDefense

Security Standards Overview

Harness the Future of Innovation

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 2 -

BSc Electrical and Electronics Engineer

20 years experience in computer security

14 Years experience in automation security

Worked as an independent consultant on financial security

Member of ISA, ISCI, ISC2

Worked for Ford Motor Company, ICS, ATOS-Origin, BP and Yokogawa

Vice President and Chief Product Architect at NexDefense

Bio

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 3 -

Background And History

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 4 -

Language difficulties

I am not in the office at the moment. Send any work to be translated

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 5 -

Man has always invented machinery to ease the burden

IBM minicomputers used in 1960s

First industrial control computer

– Texaco Port Arthur (Ramo-Wooldridge)

First DCS : 1975

– Yokogawa Centum

– Honeywell TDC 2000

Early days ….

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 6 -

Processes originally controlled by hardwired systems

Completely stand-alone

Relay-based

– Really hard to hack into

Hardwired systems

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 7 -

Large footprint

LOTS of wiring

Configuration changes

– Difficult

– Expensive

Testing a challenge

Relay systems

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 8 -

70s and 80s show an explosion in systems

PLCs, multiple DCS manufacturers

End users rushed in to deploy

– Configuration and modification simplification

– Enhanced control functions

Vendors came (and went)

Early computerization

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 9 -

Metso

Bailey Controls

Taylor Instrument

Foxboro

Varian Data Machines

Valmet

Bristol

Fisher and Porter

Midac

DEC

Vendors

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 10 -

Major evolution of DCS during 1980s

– More powerful operator stations (HMIs)

– Fully distributed control

– Proprietary hardware and software

– Little / no standardization

• Between vendors

• Within a company (vendor or end user)

– Growth in oil and gas exploration

DCS evolution

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 11 -

New DCS models and upgrades proliferate

– I/O boards

– Number of different devices

– Control software increases in sophistication

– Security?

Rise of the DCS

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 12 -

Proliferation of systems

– Many disparate vendors

– Multiple vendor mergers and acquisitions

• Well known names of 70s and 80s disappear

• Users think about standardization

– Custom made hardware and software

Rise of Microsoft and IBM PCs in IT world

Proprietary systems

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 13 -

Often non-computer orientated design team

– Systems designed by engineers

Computer Science seen as an corporate IT function

– Based on mainframes / minicomputers

– Punched cards

– 8” floppy disks

DEC PDP-11 often used

– Used and taught in engineering degrees

Vendor Systems Development

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 14 -

Personal computers proliferate in 1980s and 1990s

– Atari

– Sinclair

– BBC (Acorn)

Cost of computers came down

– (but why do they always seem to be the same?)

Networking became the norm (but not standardized)

– Token ring

Rise of Personal Computing

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 15 -

Growth of TCP/IP in late 80s

Internet starting becoming popular

– CompuServe

– AOL

– BBS

Microsoft Windows gained popularity

– Added games!

Internet and TCP/IP

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 16 -

Microsoft Windows NT

– Stable (ish) platform

– Used extensively in IT

– Large pool of expertise

OPC (1996)

– Object Linking and Embedding for Process Control

– Now Open Platform Communication Foundation

– Communication of real-time plant data between different vendors

Rise of Microsoft

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 17 -

HMIs can cost $50000

PC can cost $2000

– Do more

– Better display

– Easily extensible

– Buy from multiple sources

End users

– Question cost

– Standardization

Vendors pushed towards Windows

Cost equation

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 18 -

Typical deployment

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 19 -

Where we are today

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 20 -

9/11 changed the thought process

Companies looked at security

Industrial security woefully lacking

Control systems compromised

2001

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 21 -

PLCs crashed by IT security audit

Duplicate IP address prevents machine startup

IP address change shuts down chemical plant

Accidental programming of a remote PLC

AV software prevents boiler safety shutdown

Multiple USB infections

Accidental incidents

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 22 -

Sasser infects chemical plant

Blaster infects chemical plant

Slammer infects power company control centre

Nachi and Sasser infect baggage handling systems

Sobig virus shuts down train signalling system

Slammer infects nuclear power plant

Virus shuts down flight planning computer

Malware infections

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 23 -

Disgruntled employee changes PLC passwords to obscenity

Maroochy Shire Sewage Spill

White hat takeover of DCS consoles

Venezuela Oil striking PLC hacker sabotage

Internal hackers

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 24 -

APT attacks against oil and gas companies

Stuxnet

Shamoon

– Up to 30000 computers wiped

Zombies ahead

External hackers

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 25 -

Slow progress

– Vendors, asset owners, consultants

Public – private initiatives

– Lots of paper

– Roadmaps

Standards coming out

– ISA 99 / ISA 62443 / IEC 62443

Certifications

– Process / systems / people

Advances since 2001

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 26 -

Reasons for inaction – I’ve got a firewall!

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 27 -

Reason 2 –I’ve got a Windows firewall!

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 28 -

Asset owners

– Skills not available

– Cost of deployment (and opex)

– Not a target

– No management buy-in

– Shareholders

– Not regulated

Vendors

– Skills not available

– No management buy-in

– Not seen as saleable

Reasons for inaction

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 29 -

Consultants

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 30 -

Wurldtech

– WIB certification scheme

– Now becoming 62443-2-4

– Processes and systems

– Mainly vendors

– Take-up very slow

Wurldtech

– Achilles

Certifications

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 31 -

Threats

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 32 -

Stuxnet

Duqu

Nitro

Night Dragon

Shamoon

Anonymous

Dragonfly / Energetic Bear

Cybersecurity threat history (2010 – today)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 33 -

Stuxnet

– Very targeted attack

– Air gapped system

– Not a game changer

Stuxnet (2010)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 34 -

Stuxnet

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 35 -

Based on Stuxnet code

No ICS specific attacks

Stolen digital certificate to aid installation

Information gathering

Source : http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet_research.pdf

Duqu (2011)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 36 -

NGOs -> motor industry -> chemicals

30 chemical companies infected

Phishing and spear-phishing attacks

Poison-ivy RAT

Target : intellectual property

Source : http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_nitro_attacks.pdf

Nitro (2011)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 37 -

Targeted many oil and gas companies

Primary purpose data extraction

Attacker IP addresses resolve to China

Night Dragon (2009 - 2011)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 38 -

Source: http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf

Night Dragon (2009 - 2011)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 39 -

Infected ~30000 Saudi Aramco computers

Self-replicating worm

Destructive - wiped the hard drives

Purpose – stop the flow of oil

Spread to RasGas and others

Shamoon (2012)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 40 -

Hacktivist group

OpPetrol

Anonymous (ongoing)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 41 -

SSL/TSL bug

Code used in critical infrastructure components

Discovered by Codenomicon

Heartbleed (2014)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 42 -

Dragonfly Group (Symantec) / Energetic Bear (Crowdstrike)

– Active since 2011

– Appears to be Russian origin

– HAVEX RAT and SYSMain RAT

– Initial targets:

• US / Canada defense and aviation

– Lately

• European energy firms

Dragonfly / Energetic Bear (2014)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 43 -

Initially spear phishing executives

Watering hole attacks

– Mainly ICS vendors

Infected software packages

– VPN into PLC equipment

• 250 downloads

– PLC manufacturer

• Software available 6 weeks

– Alternative energy manufacturer

• Software available for 10 days

Source: https://scadahacker.com/files/havex/Symantec%20-%20Security%20Response%20-%20Dragonfly%20v1.0.pdf

Dragonfly modus operandi

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 44 -

Actively scanning for OPC

No active component

(yet)

Source: http://www.fireeye.com/blog/technical/targeted-attack/2014/07/havex-its-down-with-opc.html

Fertger (Peacepipe)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 45 -

Defense in depth

Network and control system knowledge

Mitigation strategies

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 46 -

Don’t just rely on one very strong protection measure.

– No single security measure is perfect – any small vulnerability could render a single protection measure ineffective

– Good security frameworks are based on a series of protection measures

– Also this provides advanced notice of attack

Defence in Depth

Keep

Outer walls

Portcullis

Drawbridge

Moat

Murder Holes

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 47 -

Industry-wide focus on Safety due to some significant events

Safety Instrumented Systems (SIS) technology changing from electrical relays to programmable electronic systems (PES)

Limited skillset in asset owner organizations to assess SIS safety integrity

Solution:

– IEC 61508/61511 international standards

– Independent 3rd party safety integrity assessment

Rewind to the 1980’s

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 48 -

Industry-wide focus on Security due to many significant events

Industrial Automation and Control Systems (IACS) technology changing from vendor proprietary to IP networking and COTS hardware/OS

Limited skillset in asset owner organizations to assess IACS cybersecurity capabilities

Solution: – ISA/IEC 62443 international standards

– Independent 3rd party security assessment - ISASecure

Fast Forward to Today

®

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 49 -

Overview of ISA/IEC standards

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 50 -

The Situation

Chlorine Truck Loading Use Case

Design & Risk Management Process

Systems vs. Zones & Conduits

Design Considerations

Security Level Vector Discussion

Overview

50

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 51 -

The Problem – With so many standards out there, how do you pick the best

one? – Once you’ve picked a set of standards, how do you apply them?

Security Standards – ISA/IEC 62443 (13) – ISO/IEC 2700x (10+) – NIST FIPS and SP800 (7+) – NERC CIP (8) – Smart Grid (?)

And that’s just the security standards, then take into account the functional standards – Wireless = ISA 100.11a, WirelessHART, Zigbee, WiFi, Bluetooth… – Safety = ISA 84, IEC 61508/61511, DO-254, OSHA… – Management = ISO 9000, 14000, 31000, 50001, Six-Sigma… – And plenty of others…

The Situation

51

IT Standards

Sector-Specific Standards

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 52 -

ISA/IEC 62443 Series (Proposed)

52

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 53 -

Security standards generally tell you what has to be done or specified, but don’t tell you how to go about doing it – Functional specifications – Security controls/countermeasures

Some standards show a generic process, but leave it up to the reader to apply it in their case A few use-cases exist, but many times these are: – Sector-specific – Only apply in certain cases – Limited in scope

Very few end-users discuss the details of their processes – Restrict information from potential attackers

Almost no vendors or system integrators discuss the details of their processes – Restrict information from potential competitors

Security Standards

53

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 54 -

Setting the Stage – ISA99 is trying to use a single use-case throughout the

entire series to show how each part of the standard fits into the process

– While the chlorine truck loading example is related to the chemical industry, the concepts presented could relate to any industry

– The example allows for somewhat more realistic discussions of risk than in an IT-focused, DHS-focused, or purely hypothetical example

Use case in early development and idea phase – Will take quite a long time to complete entire use-case

– Different parts of use-case will probably emerge at different times

Chlorine Truck Loading Use Case

54

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 55 -

Pharmaceutical Company XYZCorp – Wants to start producing new product (FixItAll) – No room for new production plant at existing facilities – Chemical process requires relatively small amounts of chlorine – Existing facility produces chlorine in large enough quantities

XYZCorp considers their options – Conducts business assessment of building new facility

• Existing facilities all near space capacity • New facility has good access to roads • Land is suitable and available • Existing chlorine production facility over 50 miles away

– Considers options for transporting chlorine • Pipeline • Rail • Truck

Chlorine Truck Loading Use Case:The Narrative

55

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 56 -

Build truck loading/unloading facilities – Loading @ existing facility, unloading @ new facility

– Unmanned except during loading/unloading operations

– Hazardous chemical requires special handling & safety

Generations of equipment – Existing facility uses legacy equipment (brown-field)

– New facility designed with current technology (green-field)

Facility monitoring & control – Unmanned – centralized monitoring @ control center

– Manned & operational – local control with both local & centralized monitoring

Attached to business systems – Billing & logistics

– Inventory tracking

Chlorine Truck Loading Use-Case: The Plan

56

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 57 -

Systems needed

– Safety Instrumented System (SIS)

– Basic Process Control System (BPCS)

– Control center

– Plant DMZ

– Enterprise systems

Level of SIS integration with BPCS?

– Air-gapped

– Interfaced

– Integrated

Use Case: Design Considerations

57

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 58 -

Process Equipment – Pump Controller – Transmitters – Block and Control Valves

BPCS & SIS – Functional Safety-PLC – Control PLC – Engineering Workstation(s) – Instrument Asset Management System – Human-Machine Interface(s)

Control Center – Control Center Workstations

Plant DMZ – Data Historian

Enterprise – Enterprise Web Server – Enterprise WLAN – Business Logistics System – Billing System

Initial Design Process: Identify the Control Assets

58

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 59 -

Now What???

59

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 60 -

Now that the business case and some initial design ideas have been put down, where do you go from here?

A. Design the control system without worrying about the security?

B. Design everything so secure that it becomes unusable?

C. Throw in firewalls everywhere?

D. Conduct a detailed risk assessment at the device level?

E. Conduct a multi-stage risk assessment starting with the top level and working down to the low level as the design progresses?

Generally, the ISA99 approach begins with E

Design Process

60

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 61 -

ISA99, Working Group 2 working on modified ISO/IEC 27005 risk management process

– Uses basic shell from 27005

– Modifies it for multi-stage risk assessment process

– Discusses “jump-in” point

– Relates risk management process to overall cyber security management system design process

• Business planning

• Change management

• Decommissioning

Modified ISO/IEC 27005 Risk Management Process

61

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 62 -

Systems ≠ Zones – Conducting a system breakdown may give some indication of

future zones, but there is no direct one-to-one correlation between the two

– Systems = Collections of equipment/assets that logically function together to perform at least one task

– Zones = Collections of equipment/assets that logically have similar security requirements

System breakdown helps to identify different sets of equipment during the risk assessment phase Zones are created after the risk assessment phase based on the particular security requirements for that set of equipment/assets Conduits are a special kind of zone containing a communication channel

Systems vs. Zones & Conduits

62

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 63 -

LEVEL 1 – Casual & Coincidental

– Violation

LEVEL 2 – Simple Means

– Low Resources

– Generic Skills

– Low Motivation

Security Levels

LEVEL 3 – Sophisticated Means

– Moderate Resources

– System-Specific Skills

– Moderate Motivation

LEVEL 4 – Sophisticated Means

– Extended Resources

– System-Specific Skills

– High Motivation

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 64 -

Design Considerations: SIS Air-Gapped vs. Interfaced vs. Integrated

64

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 65 -

Industrial Security Isn’t Always About Death & Dismemberment

– Some security concepts don’t fit into that model

Use the Foundational Requirements to Engineer the System Security

– Identification & Authentication Control

– Use Control

– System Integrity

– Data Confidentiality

– Restricted Data Flow

– Timely Response to Events

– Resource Availability

Security Level Vector Discussion

65

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 66 -

How will the switches affect the security of the BPCS & SIS?

– High availability is fairly common

– Uncommon for switches to have good access control (natively)

– Confidentiality depends, is SNMP enabled AND secured?

– If switch fails completely, what happens to system integrity? What about intermittent failures, or bad ports? What are the safety implications?

Security Level Vector Discussion

66

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 67 -

Now, what about other components?

How do each of the component capabilities roll into a system capability?

– Mathematical/Additive?

– Qualitative assessment of capabilities?

How do capabilities relate to achieved security levels?

Security Level Vector Discussion

67

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 68 -

Security Lifecycles

68

Product Development

Lifecycle

System Integration Lifecycle

System/Project Lifecycle

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 69 -

Security Lifecycle

69

Product Supplier

Engineering Entity

Asset Owner

Business Planning

Facility Planning

Detail Planning

Implementation

Construction

Startup & Commissioning

Facility Operations

Facility Decommissioning

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 70 -

ISCI

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 71 -

ISASecure certification programs are accredited as an ISO/IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations by ANSI/ACLASS.

Provides global recognition for ISASecure certification

Independent CB accreditation by ANSI/ACLASS and other global Accreditation Bodies such as JAB or UKAS

ISASecure can scale on a global basis

Ensures certification process is open, fair, credible, and robust.

MOU’s with AB’s for ISASecure

Internationally Accredited Conformance Scheme

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 72 -

One set of certification criteria

One certification test/assessment

One globally recognized mark

Economically efficient for both suppliers and asset owners

Global Acceptance of ISASecure

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 73 -

ISCI membership is open to all organizations

Strategic membership

Technical membership

Government membership

Associate membership

Informational membership

Supporters-ISCI Member Companies

Member organizations

• Chevron

• Aramco Services

• CSSC

• Codenomicon

• exida

• ExxonMobil

• Honeywell

• IT Promotion Agency, Japan

• Schneider Electric (Invensys)

• RTP Corp.

• Yokogawa

• ISA99 Committee Liaison

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 74 -

Japan Information-technology Promotion Agency and Control System Security Center

IPA Translated ISASecure specifications to Japanese

CSSC set up a test lab in Tagajo-city near Sendai Japan - Control System Security Center Certification Laboratory (CSSC-CL)

CSSC-CL was accredited by JAB (Japan Accreditation Board) to ISASecure in Q1 2014

CSSC and CSSC-CL are promoting ISASecure as part of the Japanese critical infrastructure security scheme.

CSSC-CL certified two EDSA devices in Q2 2014

Global Adoption Expands to Japan

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 75 -

1. Advanced Institute of Science and Technology

2. ALAXALA Networks Corporation

3. Azbil Corporation

4. Fuji Electric Co., Ltd.

5. Fujitsu Limited

6. Hitachi, Ltd.

7. Information Technology Promotion Agency

8. Japan Quality Assurance Organization

9. LAC Co., Ltd.

10. McAfee Co., Ltd.

11. Meidensha Corporation

12. Mitsubishi Electric Corporation

13. Mitsubishi Heavy Industries Ltd.

14. Mitsubishi Research Institute Inc.

Japan CSSC Supporters

1. Ixia Communications K.K.

2. Japan Nuclear Security System Co., Ltd

3. OTSL Inc.

4. Rock international

5. The Japan Gas Association(JGA)

6. TOYO Corporation

15. Mori Building Co., Ltd.

16. NEC Corporation

17. NRI Secure Technologies Ltd.

18. NTT Communications Corporation

19. OMRON Corporation

20. The University of Electro-Communications

21. Tohoku Information Systems Company, Incorporated

22. Toshiba Corporation

23. Toyota Info. Technology Center Co., Ltd.

24. Trend Micro Incorporated

25. Yokogawa Electric Corporation

CSSC Associate Member Companies

CSSC Supporter Companies

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 76 -

1. Embedded Device Security Assurance (EDSA) IEC-62443-4-2

2. System Security Assurance (SSA) IEC-62443-3-3

3. Security Development Lifecycle Assurance (SDLA) IEC-62443-4-1

“An ISASecure Certified Development Organization”

Three ISASecure® certifications available

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 77 -

ISASecure™

Embedded Device Security Assurance

(EDSA)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 78 -

Certification that the supplier’s product is robust against network attacks and is free from known security vulnerabilities

Meets requirements of ISA/IEC-62443-4-2 for embedded devices (will be re-aligned with 4-2 when formally

approved by IEC)

Currently available – 7 devices certified with more devices under assessment

EDSA Overview

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 79 -

Special purpose device running embedded software designed to directly monitor, control or actuate an industrial process, examples:

– Programmable Logic Controller (PLC)

– Distributed Control System (DCS) controller

– Safety Logic Solver

– Programmable Automation Controller (PAC)

– Intelligent Electronic Device (IED)

– Digital Protective Relay

– Smart Motor Starter/Controller

– SCADA Controller

– Remote Terminal Unit (RTU)

– Turbine controller

– Vibration monitoring controller

– Compressor controller

What is an Embedded Device?

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 80 -

Embedded Device Security

Assurance (EDSA)

Software Development

Security Assessment (SDSA)

Functional Security

Assessment (FSA)

Communications

Robustness Testing (CRT)

Detects and Avoids systematic design faults

• The vendor’s software development and

maintenance processes are audited

• Ensures the organization follows a robust, secure

software development process

Detects Implementation Errors / Omissions

• A component’s security functionality is audited

against its derived requirements for its target security

level

• Ensures the product has properly implemented the

security functional requirements

Identifies vulnerabilities in networks and devices

• A component’s communication robustness is tested

against communication robustness requirements

• Tests for vulnerabilities in the 4 lower layers of OSI

Reference Model

ISASecure EDSA Certification Program

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 81 -

ISASecure™ System Security Assurance (SSA)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 82 -

Certification that the supplier’s product is robust against network attacks and is free from known security vulnerabilities

Meets requirements of ISA/IEC-62443-3-3 (SSA

was re-aligned with 3-3 by ISCI in 2013 when it was approved by IEC)

Available as of Q1 2014

SSA Overview

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 83 -

Industrial Control System (ICS) or SCADA system

Available from a single supplier

Supported by a single supplier

Components are integrated into a single system

May consist of multiple Security Zones

Can be identified by a product name and version

Off the shelf; not site or project engineered yet

What is a “System” ?

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 84 -

System Security Assessment

(SSA)

Security Development

Lifecycle Assessment

(SDLA) Ensures Fundamental Security Features are

Provided

• A system’s security functionality is audited against

defined requirements for its target security level

• Ensures the system has properly implemented the

security functional requirements

Identifies Vulnerabilities in Actual Implementation

• Structured penetration testing at all entry points

• Scan for known vulnerabilities (VIT)

• Combination of CRT and other techniques

Ensures Security Was Designed-In

• The supplier’s system development and maintenance

processes are audited for security practices

• Ensures the system was designed following a robust,

secure development process

Functional Security

Assessment (FSA)

System Robustness Testing

(SRT) and

Vulnerability Identification

Testing (VIT)

ISASecure SSA Certification Program

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 85 -

Asset Discovery Scan – scan to discover the components on the network

Communications Robustness Test – verify that essential functions continue to operate

under high network load and malformed packets

Network Stress Test – verify that essential functions continue to operate

under high network load

Vulnerability Identification Test – scan all components for the presence of known

vulnerabilities (using Nessus)

– based on National Vulnerability Database

SSA System Robustness Test

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 86 -

SSA System Robustness Test

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 87 -

ISASecure™ Security Development Lifecycle

Assurance (SDLA)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 88 -

Certification that the supplier’s product development work process includes security considerations throughout the lifecycle.

(Organization process certification)

Meets requirements of ISA/IEC-62443-4-1 (will be re-aligned with 4-1 when it is formally approved by IEC)

Based on several industry-recognized security development lifecycle processes

Launched May 2014

SDLA Overview

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 89 -

1. Security Management Process

2. Security Requirements Specification

3. Security Architecture Design

4. Security Risk Assessment (Threat Model)

5. Detailed Software Design

6. Document Security Guidelines

7. Module Implementation & Verification

8. Security Integration Testing

9. Security Process Verification

10. Security Response Planning

11. Security Validation Testing

12. Security Response Execution

SDLA Phases

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 90 -

Security Development Lifecycle Assessment

Multiple Product Certification

Product #1

Functional Security

Assessment

Robustness Testing

Security Development

Lifecycle Assessment

Product #n

Robustness Testing

Security Development

Lifecycle Assessment

An organization’s product development process is certified once per the SDLA requirements

Individual products are certified which includes an assessment to verify the certified SDLA process was followed.

Functional Security

Assessment

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 91 -

Communication Robustness Testing

Secure Development

Lifecycle Assessment

Functional Security

Assessment

Security Level 4

Secure Development

Lifecycle Assessment

Functional Security

Assessment

Security Level 3

Secure Development

Lifecycle Assessment

Functional Security

Assessment

Security Level 2

Secure Development

Lifecycle Assessment

Functional Security

Assessment

Security Level 1

Vulnerability

Identification Testing

Vulnerability

Identification Testing

Vulnerability

Identification Testing

Vulnerability

Identification Testing

Ro

bu

stn

ess T

estin

g

Security Levels

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 92 -

Communication Robustness Test tools 1. Codenomicon – Defensics X

2. FFR – Raven

3. Wurldtech – Achilles

Vulnerability Scanning Tools 1. Tenable - Nessus

Test Tools Available for Use in ISASecure

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 93 -

Establishes and operates a security program based upon 62443-2-1 & -2-2

Maintains a patch management system using -2-3

Certifies that suppliers & vendors comply with -2-4

Measures achieved security using metrics from -1-3 – Uses zone & conduit model to design their systems based upon -3-2

– Builds and/or procures systems that comply with technical requirements in -3-3

– Builds and/or procures components that comply with:

• Product development lifecycle in -4-1

• Technical requirements in -4-2

Simplified Asset Owner Use Case

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 94 -

ISA/IEC-62443 standards set the requirements for Industrial Automation and Control Systems

ISASecure certifies that suppliers and products meet the ISA/IEC-62443 standards

Asset Owners have confidence that the IACS products they purchase are robust against network attacks and are free from known security vulnerabilities

In Summary

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 95 -

ISA under Automation Federation facilitating NIST effort to develop a cybersecurity framework.

Draft framework 1.0 completed in 2013. IEC 62443 standards are prominent in the document.

Cybersecurity Framework 2.0. Plans are underway for a meeting this Fall in Illinois by the White House and NIST

USA Government – Executive Order

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 96 -

Glossary

Acronym Description

ACLASS One of three brands of the ANSI-ASQ National Accreditation Board

ANSI American National Standards Institute

CSSC Control System Security Center, Japan-R&D and test lab in Tagajo-city Japan

CSSC-CL Control System Security Center, Japan – certification lab operation

ISA International Society of Automation

IACS Industrial Automation and Control System

ICS Industrial Control System

IEC International Electrotechnical Commission

IPA Information-technology Promotion Agency, Japan

ISCI ISA Security Compliance Institute

JAB Japan Accreditation Board-Japan based IEC accreditation body (AB)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 97 -

ISA 62443 Status (July 2014)

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 98 -

ISASecure Certified Devices – Q3 2014

Supplier Type Model Version Level Test Lab

Honeywell Process Solutions Safety Manager HPS 1009077 C001 R145.1 EDSA 2010.1 Level 1 exida

RTP Corporation Safety manager RTP 3000 A4.36 EDSA 2010.1 Level 2 exida

Honeywell Process Solutions DCS Controller Experion C300 R400 EDSA 2010.1 Level1 exida

Honeywell Process Solutions Fieldbus Controller Experion FIM R400 EDSA 2010.1 Level 1 exida

Yokogawa Electric Corporation

Safety Control System ProSafe-RS R3.02.10 EDSA2010.1 Level 1 exida

Yokogawa Electric Corporation DCS Controller CENTUM VP R5.03.00 EDSA 2010.1 Level 1 CSSC-CL

Hitachi, Ltd. DCS Controller HISEC 04/R900E 01-08-A1 EDSA 2010.1 Level 1 CSSC-CL

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 99 -

ISASecure Program Structure

IEC Accreditation Body (AB) ANSI/ACLASS or JAB

Chartered Lab

Test Tool Vendor

ISCI IACS Vendor

Defines Program

- Certification Scheme

- Accreditation Requirements

Recognizes

Test Tools

Develops Test

Specs

Submits Product

Assesses Product

Issues ISASecure

Certification Uses Recognized

Test Tool

Accredits

End Users

Procurement Specifications

Specify ISASecure in

Procurement Documents

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 100 -

CSSC-CL Receives Accreditation from JAB

April 2014 Photo-Mr. Hideaki Kobayashi, Vice-President of CSSC-CL showing Guide 65 and ISO 17025 accreditation certificates from JAB for ISASecure EDSA conformance scheme.

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 101 -

CSSC-CL ISCI Meeting July 2014

July 2014 Photo-Andre Ristaino, ISCI Managing Director with Mr. Hideaki Kobayashi, Vice-President of CSSC-CL and team members during tour and celebration of accreditation by JAB and completion of first two ISASecure EDSA certifications.

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 102 -

No bears were hurt in the making of this presentation

Questions?

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 103 -

Graham Speake

Vice President and Chief Product Architect, NexDefense ICS 410 Course Instructor, The SANS Institute

Email: [email protected] LinkedIn: Graham Speake

Contact details

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 104 -

Eric Cosman

Co-Chairman ISA99 Committee

[email protected]

Jim Gilsinn

Co-Chairman ISA99 Committee

[email protected]

Who to contact for ISA99 committee

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 105 -

ISASecure certificate - exida

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 106 -

Who to Contact to Certify Products

ISASecure EDSA Chartered Lab:

Exida – USA and EU

Mike Medoff

Director of Security Services

Phone: (215) 453-1720

Fax: (215) 257-1657

Email: [email protected]

Website: http://www.exida.com

ISASecure EDSA Chartered Lab: CSSC - Japan Kenzo Yoshimatsu Phone: +81 (22) 353-6751 Email: [email protected] Website: http://www.css-center.or.jp

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 107 -

Andre Ristaino

Managing Director, ASCI

Phone: 919-990-9222

Fax: 919-549-8288

Email: [email protected]

Website: http://www.isasecure.org

Who to contact for ISCI Membership

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 108 -

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 109 -

Section Divider

2014 Yokogawa Users Group Conference & Exhibition Copyright © Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX

- 110 -

Thank-You